Apr 07, 2026 • Bruce Schneier
Cybersecurity in the Age of Instant Software
This article explores how AI is transforming software development toward 'instant software'—dynamically generated applications—and the cybersecurity...
Executive Summary
This article explores how AI is transforming software development toward 'instant software'—dynamically generated applications—and the cybersecurity implications of this shift. AI tools are increasingly capable of finding and exploiting vulnerabilities, enabling even unsophisticated attackers to conduct sophisticated attacks. The article predicts AI will target open-source libraries and legacy commercial software, including vulnerable IoT devices and industrial control systems. However, defenders also benefit from AI-powered vulnerability detection and automated patching. The author emphasizes that while new instant software favors defenders due to ephemeral lifespans, legacy software remains a significant vulnerability. The future cyber arms race will depend on whether AI improves at writing secure code, potentially creating near vulnerability-free software—or continues generating insecure code that attackers can exploit.
Summary
AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an application on demand—a spreadsheet, for example—and delete it when you’re done using it than to buy one commercially. Future systems could include a mix: both traditional long-term software and ephemeral instant software that is constantly being written, deployed, modified, and deleted. AI is changing cybersecurity as well. In particular, AI systems are getting better at finding and patching vulnerabilities in code. This has implications for both attackers and defenders, depending on the ways this and related technologies improve...
Published Analysis
This article explores how AI is transforming software development toward 'instant software'—dynamically generated applications—and the cybersecurity implications of this shift. AI tools are increasingly capable of finding and exploiting vulnerabilities, enabling even unsophisticated attackers to conduct sophisticated attacks. The article predicts AI will target open-source libraries and legacy commercial software, including vulnerable IoT devices and industrial control systems. However, defenders also benefit from AI-powered vulnerability detection and automated patching. The author emphasizes that while new instant software favors defenders due to ephemeral lifespans, legacy software remains a significant vulnerability. The future cyber arms race will depend on whether AI improves at writing secure code, potentially creating near vulnerability-free software—or continues generating insecure code that attackers can exploit. AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an application on demand—a spreadsheet, for example—and delete it when you’re done using it than to buy one commercially. Future systems could include a mix: both traditional long-term software and ephemeral instant software that is constantly being written, deployed, modified, and deleted. AI is changing cybersecurity as well. In particular, AI systems are getting better at finding and patching vulnerabilities in code. This has implications for both attackers and defenders, depending on the ways this and related technologies improve... AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an application on demand—a spreadsheet, for example—and delete it when you’re done using it than to buy one commercially. Future systems could include a mix: both traditional long-term software and ephemeral instant software that is constantly being written, deployed, modified, and deleted. AI is changing cybersecurity as well. In particular, AI systems are getting better at finding and patching vulnerabilities in code. This has implications for both attackers and defenders, depending on the ways this and related technologies improve. In this essay, I want to take an optimistic view of AI’s progress, and to speculate what AI-dominated cybersecurity in an age of instant software might look like. There are a number of unknowns that will factor into how the arms race between attacker and defender might play out. How flaw discovery might work On the attacker side, the ability of AIs to automatically find and exploit vulnerabilities has increased dramatically over the past few months. We are already seeing both government and criminal hackers using AI to attack systems. The exploitation part is critical here, because it gives an unsophisticated attacker capabilities far beyond their understanding. As AIs get better, expect more attackers to automate their attacks using AI. And as individuals and organizations can increasingly run powerful AI models locally, AI companies monitoring and disrupting malicious AI use will become increasingly irrelevant. Expect open-source software, including open-source libraries incorporated in proprietary software, to be the most targeted, because vulnerabilities are easier to find in source code. Unknown No. 1 is how well AI vulnerability discovery tools will work against closed-source commercial software packages. I believe they will soon be good enough to find vulnerabilities just by analyzing a copy of a shipped product, without access to the source code. If that’s true, commercial software will be vulnerable as well. Particularly vulnerable will be software in IoT devices: things like internet-connected cars, refrigerators, and security cameras. Also industrial IoT software in our internet-connected power grid, oil refineries and pipelines, chemical plants, and so on. IoT software tends to be of much lower quality, and industrial IoT software tends to be legacy. Instant software is differently vulnerable. It’s not mass market. It’s created for a particular person, organization, or network. The attacker generally won’t have access to any code to analyze, which makes it less likely to be exploited by external attackers. If it’s ephemeral, any vulnerabilities will have a short lifetime. But lots of instant software will live on networks for a long time. And if it gets uploaded to shared tool libraries, attackers will be able to download and analyze that code. All of this points to a future where AIs will become powerful tools of cyberattack, able to automatically find and exploit vulnerabilities in systems worldwide. Automating patch creation But...